Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityCybersecurity News

Why Visitor Management is Critical for Business Continuity During and Post-COVID-19

By Gregory Blondeau
visitor management
June 12, 2020

We’re seeing the term “business continuity” used everywhere nowadays, while search engines report more than 10,000 monthly searches for the word, globally. On the surface, this makes sense, given the fact that we’ve all been faced with the reality of adjusting our business models to account for the effects of COVID-19. The stronger your business continuity plan (BCP), the less you have to scramble to run your business smoothly. So, where does visitor management fall into the grand scheme of things?

Long story short, companies need to perform due care to protect their workforce from COVID-19 during and post-lockdown periods. But they also need to allow their employees, contractors and visitors onto their premises while being fully accountable for everyone’s health and safety. Aside from the basic benefits that a visitor management system affords you—efficiency, branding, security and compliance—there is also the need to uphold visitor privacy. Not only is data privacy now touted as being a basic human right, but it’s also critical going forward as we are required to collect health-related information.

 

Crucial First Steps Need to be Taken

Above all else, we should all continue to monitor public information provided by local and governmental health authorities. If you need to adopt severe measures according to government directives around safe working practices, then most of them will likely start at the entrance of your business sites. This is where choosing the right visitor management system will make all the difference. 

There are seven concrete steps you can put in place in this crisis situation, and during your recovery phase for re-entry to the office:

  1. Take a phased approach in your return to work plan: It's important to reduce the number of unexpected visitors to your property, and move to an invite-first culture where all visitors are pre-registered. This will reduce the number of non-essential visits and also allow you to screen and communicate ahead of time.
  2. Implement a touchless check-in process: By leveraging unique QR codes and access control system integrations, you can offer your visitors a safer way to move around your premises.
  3. Perform health and safety screenings ahead of time: Email your visitors important health and safety information, NDAs or agreements to sign in advance of their arrival. You can grant or deny access based on questions you’ve asked during your pre-check-in process.
  4. Customize the check-in process: Configure relevant check-in screens that allow your visitors to complete a quick health questionnaire to determine whether or not to grant then access to your premises.
  5. Integrate watchlists for monitoring visitors: Quickly and discreetly flag any visitors who may need special attention or denied access depending on a previous health and security screening.
  6. Safely and easily retrieve data: Rest assured that you‘ll have a full audit trail of data to use for insurance-related or law enforcement investigations.
  7. Real-time emergency lists: Perform roll calls or send follow-up communication, as needed, to relay important information to your visitors.

 

Be Proactive and Stay Ahead of the Crisis

It’s not too late to put a cloud-based visitor management system in place. In fact, it’s no longer a nice-to-have in this era but a must-have to future-proof your business. Your business continuity planning should include visitor management at each step in order for your organization to deliver what you’ve promised to your internal and external stakeholders alike. In order to instill the confidence your employees need to operate as “business as usual,” now and post-COVID, you’ll need to tackle the way you manage your entrances and front desks right away.

Your customers and other stakeholders will be watching to see how proactive you are in ensuring full accountability for your actions in keeping your people, your premises and your intellectual property safe. This is an opportunity to boost customer loyalty and trust, minimize downtime and recovery costs and achieve your business goals and growth despite the odds.

KEYWORDS: business continuity COVID-19 risk management visitor management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Gregory blondeau

Gregory Blondeau is CEO and Founder of Proxyclick, a provider of enterprise visitor management software. Prior to Proxyclick, he spent a short decade between Munich, London and Paris, working for the Private Telecommunications Division of Siemens AG and nurturing his interest for European politics, culture, languages and way of living. He returned to Brussels in 2000, working in two start-ups before co-funding Proxyclick. Since then, he has been working tirelessly to develop the business first in Belgium, then across Europe and in North America. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Choice Concept With Doors

    Why Visitor and Contractor Management is Critical in Busy Facilities

    See More
  • computer

    How to mitigate critical cyber risks in a post-COVID-19 environment

    See More
  • Cyber security threat

    Why cyber resilience must be the strategic focus for business continuity

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing